CN111683070B - Data transmission method and device based on identity encryption and storage medium - Google Patents

Data transmission method and device based on identity encryption and storage medium Download PDF

Info

Publication number
CN111683070B
CN111683070B CN202010471292.2A CN202010471292A CN111683070B CN 111683070 B CN111683070 B CN 111683070B CN 202010471292 A CN202010471292 A CN 202010471292A CN 111683070 B CN111683070 B CN 111683070B
Authority
CN
China
Prior art keywords
public
private key
user
address
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010471292.2A
Other languages
Chinese (zh)
Other versions
CN111683070A (en
Inventor
谢丹力
贾牧
张鹏程
陆陈一帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202010471292.2A priority Critical patent/CN111683070B/en
Publication of CN111683070A publication Critical patent/CN111683070A/en
Priority to PCT/CN2021/096243 priority patent/WO2021239034A1/en
Application granted granted Critical
Publication of CN111683070B publication Critical patent/CN111683070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a block chain technology, and discloses a data transmission method based on identity encryption, which comprises the following steps: the method comprises the steps of distributing a first public and private key pair and a second public and private key pair for a user B, randomly distributing a third private key pair for the user A, calculating a public key address of the second public and private key pair according to the first public and private key pair, the second public and private key pair and the third public and private key, carrying out encryption operation on a data set according to the public key address to obtain an encrypted data set, calculating a transmission public key address transmitted to the user B by using the encrypted data set, verifying whether the public key address is the same as the transmission public key address, and allowing the data set to be transmitted to the user B if the public key address is the same as the transmission public key address. The invention also provides a data transmission device based on identity encryption, electronic equipment and a computer readable storage medium. The invention carries out the relation calculation according to the public and private key pair of the user, thereby improving the scheme of the data transmission safety.

Description

Data transmission method and device based on identity encryption and storage medium
Technical Field
The present invention relates to the field of security technologies, and in particular, to a data transmission method and apparatus based on identity encryption, an electronic device, and a computer-readable storage medium.
Background
The existing data encryption scheme mainly hides the identity information of a user by using a public key address method, but the mechanism is unreliable, on one hand, the security of data stored in a common database is low, and on the other hand, when a certain user frequently uses the own public key address to carry out transaction, the user portrait can be matched through the transaction frequency, the transaction time and the like, so that the user information can be obtained by judging the user, and the security is reduced.
Disclosure of Invention
The invention provides a data transmission method, a device, electronic equipment and a computer readable storage medium based on identity encryption, and mainly aims to provide a scheme for performing relation calculation according to a public and private key pair of a user so as to improve the data transmission security.
In order to achieve the above object, the present invention provides a data transmission method based on identity encryption, which includes:
receiving a connection request of a user A to a user B, and allocating a first public and private key pair and a second public and private key pair to the user B according to the connection request;
randomly distributing a third private key pair for the user A when the first public and private key pair and the second public and private key pair are successfully distributed;
calculating a public key address of the second public and private key pair based on an address calculation method according to the first public and private key pair, the second public and private key pair and the third public and private key;
extracting a data set transmitted from the user A to the user B from a pre-constructed first block chain, and encrypting the data set according to the public key address to obtain an encrypted data set;
calculating a transfer public key address to be transferred to the user B using the encrypted data set, verifying whether the public key address and the transfer public key address are the same;
and if the public key address is different from the transmission public key address, refusing to transmit the data set to the user B, and if the public key address is the same as the transmission public key address, allowing to transmit the data set to the user B, and storing the data set to a pre-constructed second block chain in a block chain manner.
Optionally, the allocating a first public-private key pair and a second public-private key pair to the user B according to the connection request includes:
when the user B responds to the connection request, a first private key and a second private key are randomly generated;
solving a first public key of the first private key and a second public key of the second private key according to a modular operation;
and combining the first private key and the first public key to obtain the first public and private key pair, and combining the second private key and the second public key to obtain the second public and private key pair.
Optionally, the solving for the first public key of the first private key and the second public key of the second private key according to a modulo operation includes:
solving the first public key by using the following solving formula
Figure BDA0002513728740000021
And a second public key
Figure BDA0002513728740000022
Figure BDA0002513728740000023
Figure BDA0002513728740000024
Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000025
in order to be able to use the first private key,
Figure BDA0002513728740000026
and n is the product value of two random prime numbers, g is a preset data value, and mod is the modular operation.
Optionally, the address calculation method is:
Figure BDA0002513728740000027
Figure BDA0002513728740000028
wherein, the address represents the public key address of the second public and private key pair, the KDF represents the address calculation method,
Figure BDA0002513728740000029
representing the diffie-hellman key exchange rule,
Figure BDA00025137287400000210
is a third public key corresponding to the third private key pair.
Optionally, the encrypting the data set according to the public key address to obtain an encrypted data set includes:
acquiring a user signature and a confusion public key of the user A;
and packaging the user signature, the confusion public key, the public key address and the data set to obtain the encrypted data set.
Optionally, the calculating a transfer public key address to be transferred to the user B using the encrypted data set includes:
extracting the obfuscated public key of the user A in the encrypted data set;
according to the obfuscated public key, the address _ transmit of the transmission public key is obtained by calculation through the following calculation method:
Figure BDA0002513728740000031
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000032
the obfuscated public key of the user A and the KDF are the addressesThe method of calculation is carried out in a way that,
Figure BDA0002513728740000033
for the diffie-hellman key exchange rule,
Figure BDA0002513728740000034
in order to be able to use said first public key,
Figure BDA0002513728740000035
g is a preset data value for the second public key.
In order to solve the above problem, the present invention further provides an identity encryption-based data transmission apparatus, including:
a public and private key pair generation module, configured to receive a connection request from a user a to a user B, allocate a first public and private key pair and a second public and private key pair to the user B according to the connection request, and randomly allocate a third private key pair to the user a when the allocation of the first public and private key pair and the second public and private key pair is successful;
a public key address calculation module used for calculating the public key address of the second public and private key pair based on an address calculation method according to the first public and private key pair, the second public and private key pair and the third public and private key;
the encrypted data calculation module is used for extracting a data set transmitted from the user A to the user B from a pre-constructed first block chain, and carrying out encryption operation on the data set according to the public key address to obtain an encrypted data set;
and the data transmission module is used for calculating a transmission public key address transmitted to the user B by using the encrypted data set, verifying whether the public key address is the same as the transmission public key address, refusing to transmit the data set to the user B if the public key address is not the same as the transmission public key address, allowing to transmit the data set to the user B if the public key address is the same as the transmission public key address, and storing the data set to a pre-constructed second block chain in a block chain mode.
Optionally, the allocating, according to the connection request, a first public-private key pair and a second public-private key pair to user B includes:
when the user B responds to the connection request, a first private key and a second private key are randomly generated;
solving a first public key of the first private key and a second public key of the second private key according to a modular operation;
and combining the first private key and the first public key to obtain the first public and private key pair, and combining the second private key and the second public key to obtain the second public and private key pair.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
a processor executing instructions stored in the memory to implement the identity-based encryption data transfer method of any of the above.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the identity encryption-based data transmission method according to any one of the above aspects.
The invention firstly stores the data set into a pre-constructed block chain, improves the security of the data set by utilizing the characteristics that the data of the block chain is not easy to be distorted and the like, simultaneously generates a first public and private key pair and a second public and private key pair according to the connection request between users, and randomly generates a third private key pair. Therefore, the data transmission method, the data transmission device and the computer readable storage medium based on identity encryption provided by the invention can provide a scheme for performing relationship calculation according to the public and private key pair of the user, thereby improving the data transmission security.
Drawings
Fig. 1 is a schematic flowchart of a data transmission method based on identity encryption according to an embodiment of the present invention;
fig. 2 is a detailed flowchart illustrating allocation of a first public-private key pair and a second public-private key pair in the data transmission method based on identity encryption according to an embodiment of the present invention;
FIG. 3 is a block diagram of data transmission based on identity-based encryption according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an internal structure of an electronic device for data transmission method based on identity encryption according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The execution subject of the data transmission method based on identity encryption provided by the embodiment of the present application includes, but is not limited to, at least one of electronic devices, such as a server and a terminal, which can be configured to execute the method provided by the embodiment of the present application. In other words, the example dynamic adjustment method may be executed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, and an application service layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node point devices and used for verifying the effectiveness of the service request, recording the effective request after consensus is completed on storage, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the encrypted service information to a shared account (network communication) completely and consistently, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The invention provides a data transmission method based on identity encryption. Fig. 1 is a schematic flowchart of a data transmission method based on identity encryption according to an embodiment of the present invention. The method may be performed by an apparatus, which may be implemented by software and/or hardware.
In this embodiment, the data transmission method based on identity encryption includes:
s1, receiving a connection request of a user A to a user B, and distributing a first public and private key pair and a second public and private key pair to the user B according to the connection request.
The connection request is different in the realized form according to different scenes, for example, in the block chain transaction, if a user A wants to transfer money to a user B, a transfer request needs to be sent before transferring the money, so that the transfer can be safely and normally carried out.
In detail, the allocating a first public-private key pair and a second public-private key pair to the user B according to the connection request is shown in a detailed flowchart of fig. 3, and includes:
s11, when the user B responds to the connection request, randomly generating a first private key and a second private key;
s12, solving a first public key of the first private key and a second public key of the second private key according to a modulus operation;
s13, combining the first private key and the first public key to obtain the first public and private key pair, and combining the second private key and the second public key to obtain the second public and private key pair.
Preferably, the first and second public and private key pairs are respectively:
Figure BDA0002513728740000061
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000062
the first private key and the second private key are respectively, are not disclosed,
Figure BDA0002513728740000063
the first public key and the second public key are respectively, for example, in the blockchain transaction system, the external public is detectable in the blockchain, the non-external public is not detectable in the blockchain, the first public key and the second public key are in a secret state, and further,
Figure BDA0002513728740000064
also known as the master public key, of the public key,
Figure BDA0002513728740000065
also known as derivativeA key.
Wherein:
Figure BDA0002513728740000066
Figure BDA0002513728740000067
where n is the product of two random prime numbers and g is a predetermined data value (preferably, the value of g is predetermined to be very large, e.g. 500000, since it is based on the exponential function axWhen the base number a satisfies a value of more than 1 and the numerical value is larger, axThe larger the value of (b), the larger the value of the master public key and the derivative public key obtained by combining the scheme is, so that the master public key and the derivative public key are not easy to crack), and mod is a modular operation. If the user A transfers the money to the user B, before the money transfer, a first public and private key pair and a second public and private key pair of the user B are established to ensure that the identity of the user A and the identity of the user B are encrypted in the subsequent data transmission process of the user A and the user B.
S2, when the first public and private key pair and the second public and private key pair are successfully distributed, randomly distributing a third private key pair to the user A.
Preferably, the third public and private key pair is
Figure BDA0002513728740000068
Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000069
is the third private key, and is,
Figure BDA00025137287400000610
is a third public key corresponding to the third private key pair, wherein:
Figure BDA00025137287400000611
g is a large number less than n that meets the cryptographic security requirements, and is recommended to be 2048 bits in length.
S3, calculating the public key address of the second public and private key pair based on the address calculation method according to the first public and private key pair, the second public and private key pair and the third public and private key.
Preferably, the method for calculating the public key address of the second public-private key pair comprises:
Figure BDA0002513728740000071
wherein address represents a public key address of the second public-private key pair, KDF represents the address calculation method, such as HMAC algorithm and the like,
Figure BDA0002513728740000072
representing the diffie-hellman key exchange law,
Figure BDA0002513728740000073
in order to be able to use said first public key,
Figure BDA0002513728740000074
g is a preset data value for the second public key, and further, the second public key is a public key of the public key
Figure BDA0002513728740000075
The calculating method comprises the following steps:
Figure BDA0002513728740000076
s4, extracting a data set transmitted from the user A to the user B from the pre-constructed first block chain, carrying out encryption operation on the data set according to the public key address to obtain an encrypted data set, and calculating a public key transmission address transmitted to the user B by using the encrypted data set.
In the preferred embodiment of the present invention, the first blockchain generally corresponds to the user a, and the data set is stored in the blockchain instead of the general database, so as to effectively utilize the data security and accuracy of the blockchain, further improve the security assurance of the data, and then quickly complete the function of extracting a large amount of data according to the advantage of high throughput of the blockchain.
Preferably, the encrypting the data set according to the public key address to obtain an encrypted data set includes: and obtaining the user signature and the confusion public key of the user A, and packaging the user signature, the confusion public key, the public key address and the data set to obtain an encrypted data set.
Further, the encrypted data set is represented in the form of:
Figure BDA0002513728740000077
as in the blockchain trading system, value is the data set, sin is the user signature of user a in the blockchain,
Figure BDA0002513728740000078
the obfuscated public key on the blockchain for user a.
Preferably, said calculating a delivery public key address for delivery to said user B using said encrypted data set comprises: and extracting the confusion public key of the user A in the encrypted data set, and calculating to obtain the transmission public key address according to the confusion public key.
Further, the calculation method for obtaining the address of the transfer public key according to the obfuscation public key comprises:
Figure BDA0002513728740000079
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA00025137287400000710
for the obfuscated public key of user a on the blockchain, KDF is an arbitrary address computation algorithm,
Figure BDA00025137287400000711
representing the diffie-hellman key exchange rule.
S5, verifying whether the public key address and the transmission public key address are the same.
And S6, if the public key address is not the same as the transmission public key address, refusing to transmit the data set to the user B.
And S7, if the public key address is the same as the transfer public key address, allowing the data set to be transferred to the user B, and storing the data set to a second block chain which is pre-constructed in a block chain mode.
Based on the invention, it can be seen that, assuming that Alice has account transaction with Bob, Carol, Dave, Eric, Ivan, malloy at ordinary times, when Bob, Carol, Dave transfer to Alice, the account is not directly transferred out, a connection request is firstly sent between Bob-Alice, Carol-Alice, Dave-Alice, and a first and a second public and private key pairs (wherein, the first public key of Alice account is also called a master public key, and the second public key of Alice account is also called a derivative public key) are established in Alice account according to the connection request, so as to ensure that Alice and Bob, Alice and Carol, Alice and Dave encrypt the identities of Bob, Carol, Dave, Alice in the data transmission process.
Further, after a first public and private key pair is established in an Alice account, it can be known through S2 that a third private key pair is established by using the first and second public and private keys of Alice as Bob, Carol, and Dave, after the establishment of the third private key pair of each account is completed, a public key address of the second public and private key of Alice is obtained through calculation according to the third private key pair of Bob, Carol, and Dave, when money is transferred, the money data is encrypted according to the public key address, because each account corresponds to a key pair and is also encrypted on the money data, if Dave transfers money to Alice, each account corresponds to a key pair, and data conversion is performed between the key pairs, thereby hiding each account is realized.
In detail, as shown in the above example, after the connection request between Bob-Alice, Carol-Alice, and Dave-Alice is successful, after a first and a second public-private key pair is required to be established in an Alice account, Alice uses the first and the second public-private keys of Alice as Bob, Carol, and Dave to establish a third private key pair, and then performs a transfer operation, further, after Alice receives the transfer success of Bob, Alice transfers the received account of Bob to its own fourth public key (corresponding to the second public key and also called as a derived public key), at this time, the second public key reaches a preset threshold (the preset threshold accepts only one transfer of funds and one transfer of funds), so that the second public key is not used in the future, a new public key needs to be regenerated to exchange funds with Bob, Carol, and Dave, which avoids the problem that the same account is repeatedly used to cause big data tracking statistics, the safety is improved.
Fig. 3 is a functional block diagram of the data transmission apparatus based on identity encryption according to the present invention.
The data transmission device 100 based on identity encryption of the present invention can be installed in an electronic device. According to the implemented functions, the data transmission device based on identity encryption can comprise a public and private key pair generation module 101, a public key address calculation module 102, an encrypted data calculation module 103 and a data transmission module 104. A module according to the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and can perform a fixed function, and are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the public and private key pair generation module 101 is configured to receive a connection request from a user a to a user B, allocate a first public and private key pair and a second public and private key pair to the user B according to the connection request, and randomly allocate a third private key pair to the user a when the allocation of the first public and private key pair and the second public and private key pair is successful.
The connection request is different in the realized form according to different scenes, for example, in the block chain transaction, if a user A wants to transfer money to a user B, a transfer request needs to be sent before transferring the money, so that the transfer can be safely and normally carried out.
In detail, the allocating a first public-private key pair and a second public-private key pair to the user B according to the connection request includes: and when the user B responds to the connection request, randomly generating a first private key and a second private key, solving a first public key of the first private key and a second public key of the second private key according to a modulus operation, combining the first private key and the first public key to obtain a first public and private key pair, and combining the second private key and the second public key to obtain a second public and private key pair.
Preferably, the first and second public and private key pairs are respectively:
Figure BDA0002513728740000091
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000092
the first private key and the second private key are respectively, are not disclosed,
Figure BDA0002513728740000093
the first public key and the second public key are respectively, for example, in the blockchain transaction system, the external public is detectable in the blockchain, the non-external public is not detectable in the blockchain, the first public key and the second public key are in a secret state, and further,
Figure BDA0002513728740000094
also known as the master public key, of the public key,
Figure BDA0002513728740000095
also known as a derivative public key.
Wherein:
Figure BDA0002513728740000096
Figure BDA0002513728740000097
where n is the product of two random prime numbers and g is a predetermined data value (preferably, the value of g is predetermined to be very large, e.g. 500000, since it is based on the exponential function axWhen the base number a satisfies a value of more than 1 and the numerical value is larger, axThe larger the value of (a), the larger the master public key and derivative public key value obtained in combination with the present disclosure, and thus less likelyCracked), mod is the modulo operation. If the user A transfers the money to the user B, before transferring the money, a first public and private key pair and a second public and private key pair of the user B are created to ensure that the identity of the user A and the identity of the user B are encrypted in the subsequent data transmission process of the user A and the user B.
Preferably, the third public and private key pair is
Figure BDA0002513728740000098
Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000099
is the third private key, and is,
Figure BDA00025137287400000910
is a third public key corresponding to the third private key pair, wherein:
Figure BDA00025137287400000911
g is a large number less than n that meets the cryptographic security requirements, and is recommended to be 2048 bits long.
The public key address calculation module 102 is configured to calculate a public key address of the second public and private key pair based on an address calculation method according to the first public and private key pair, the second public and private key pair, and the third public and private key.
Preferably, the method for calculating the public key address of the second public-private key pair comprises:
Figure BDA0002513728740000101
wherein address represents a public key address of the second public-private key pair, KDF represents the address calculation method, such as HMAC algorithm and the like,
Figure BDA0002513728740000102
representing the diffie-hellman key exchange rule,
Figure BDA0002513728740000103
in order to be able to use said first public key,
Figure BDA0002513728740000104
g is a preset data value for the second public key, and further, the
Figure BDA0002513728740000105
The calculation method comprises the following steps:
Figure BDA0002513728740000106
the encrypted data calculation module 103 is configured to extract a data set transmitted from the user a to the user B from a pre-constructed first block chain, and perform an encryption operation on the data set according to the public key address to obtain an encrypted data set.
In the preferred embodiment of the present invention, the first blockchain generally corresponds to the user a, and the data set is stored in the blockchain instead of the general database, so as to effectively utilize the data security and accuracy of the blockchain, further improve the security assurance of the data, and then quickly complete the function of extracting a large amount of data according to the advantage of high throughput of the blockchain.
Preferably, the encrypting the data set according to the public key address to obtain an encrypted data set includes: and obtaining the user signature and the confusion public key of the user A, and packaging the user signature, the confusion public key, the public key address and the data set to obtain an encrypted data set.
Further, the encrypted data set is represented in the form of:
Figure BDA0002513728740000107
as in the blockchain trading system, value is the data set, sin is the user signature of user a in the blockchain,
Figure BDA0002513728740000108
the obfuscated public key on the blockchain for user a.
The data transmission module 104 is configured to calculate a public key transmission address to be transmitted to the user B by using the encrypted data set, verify whether the public key transmission address is the same as the public key transmission address, refuse to transmit the data set to the user B if the public key transmission address is different from the public key transmission address, allow to transmit the data set to the user B if the public key transmission address is the same as the public key transmission address, and store the data set to a second block chain that is pre-constructed in a block chain manner.
Preferably, said calculating a delivery public key address for delivery to said user B using said encrypted data set comprises: and extracting the confusion public key of the user A in the encrypted data set, and calculating to obtain the address of the transmission public key according to the confusion public key.
Further, the calculation method for obtaining the address of the transfer public key by calculation according to the obfuscation public key is as follows:
Figure BDA0002513728740000111
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002513728740000112
for the obfuscated public key of user a on the blockchain, KDF is an arbitrary address computation algorithm,
Figure BDA0002513728740000113
representing the diffie-hellman key exchange law.
Based on the invention, it can be seen that, assuming that Alice has account transaction with Bob, Carol, Dave, Eric, Ivan, malloy at ordinary times, when Bob, Carol, Dave transfer to Alice, the account is not directly transferred out, a connection request is firstly sent between Bob-Alice, Carol-Alice, Dave-Alice, and a first and a second public and private key pairs (wherein, the first public key of Alice account is also called a master public key, and the second public key of Alice account is also called a derivative public key) are established in Alice account according to the connection request, so as to ensure that Alice and Bob, Alice and Carol, Alice and Dave encrypt the identities of Bob, Carol, Dave, Alice in the data transmission process.
Further, after a first public and private key pair is established in an Alice account, it can be known through S2 that a third private key pair is established by using the first and second public and private keys of Alice as Bob, Carol, and Dave, after the establishment of the third private key pair of each account is completed, a public key address of the second public and private key of Alice is obtained through calculation according to the third private key pair of Bob, Carol, and Dave, when money is transferred, the money data is encrypted according to the public key address, because each account corresponds to a key pair and is also encrypted on the money data, if Dave transfers money to Alice, each account corresponds to a key pair, and data conversion is performed between the key pairs, thereby hiding each account is realized.
In detail, as shown in the above example, after the connection request among Bob-Alice, Carol-Alice, and Dave-Alice succeeds, it needs to establish a first and second public and private key pairs in the account of Alice, then use the first and second public and private keys of Alice as Bob, Carol, and Dave to establish a third private key pair, and further perform a transfer operation, and further, after Alice accepts the transfer of Bob successfully, Alice transfers the account of Bob to its fourth public key (corresponding to the second public key, also called derivative public key), at this time, the second public key has reached the preset threshold (the preset threshold accepts only one transfer of funds and one transfer of funds), so the second public key is not used in the future, and it needs to regenerate a new public key to exchange funds with Bob, Carol, and Dave, which avoids the problem that the same account is repeatedly used to cause big data tracking statistics, the safety is improved.
Fig. 4 is a schematic structural diagram of an electronic device implementing the data transmission method based on identity encryption according to the present invention.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus, and may further comprise a computer program, such as an identity encryption based data transfer program 12, stored in the memory 11 and executable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only for storing application software installed in the electronic device 1 and various types of data, such as codes of the data transfer program 12 based on identity encryption, etc., but also for temporarily storing data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the whole electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (for example, executing a data transmission program based on identity encryption, etc.) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
The invention firstly stores the data set into a pre-constructed block chain, improves the security of the data set by utilizing the characteristics that the data of the block chain is not easy to be distorted and the like, simultaneously generates a first public and private key pair and a second public and private key pair according to the connection request between users, and randomly generates a third private key pair. Therefore, the data transmission method, the data transmission device and the computer readable storage medium based on identity encryption provided by the invention can provide a scheme for performing relationship calculation according to the public and private key pair of the user so as to improve the data transmission security.
Fig. 4 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 4 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device 1 and for displaying a visualized user interface.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The identity encryption based data transfer program 12 stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, enable:
extracting a connection request of a user A to a user B from a pre-constructed first block chain, and distributing a first public and private key pair and a second public and private key pair to the user B according to the connection request;
randomly distributing a third private key pair for the user A when the first public and private key pair and the second public and private key pair are successfully distributed;
calculating a public key address of the second public and private key pair based on an address calculation method according to the first public and private key pair, the second public and private key pair and the third public and private key;
receiving a data set transmitted from the user A to the user B, and encrypting the data set according to the public key address to obtain an encrypted data set;
calculating a delivery public key address delivered to the user B using the encrypted data set, verifying whether the public key address and the delivery public key address are the same;
and if the public key address is different from the transmission public key address, refusing to transmit the data set to the user B, and if the public key address is the same as the transmission public key address, allowing to transmit the data set to the user B, and storing the data set to a pre-constructed second block chain in a block chain manner.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again.
Further, the integrated modules/units of the electronic device 1 may be stored in a computer readable storage medium if they are implemented in the form of software functional units and sold or used as independent products. The computer-readable medium may include: any entity or device capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic diskette, an optical disk, a computer Memory, a Read-Only Memory (ROM).
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference to any claim should not be construed as limiting the claim concerned.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (9)

1. A method for data transfer based on identity encryption, the method comprising:
receiving a connection request of a user A to a user B, and allocating a first public and private key pair and a second public and private key pair to the user B according to the connection request;
when the first public and private key pair and the second public and private key pair are successfully distributed, randomly distributing a third private key pair to the user A;
calculating a public key address of the second public and private key pair based on an address calculation method according to the first public and private key pair, the second public and private key pair and the third private key pair;
extracting a data set transmitted from a user A to a user B from a pre-constructed first block chain corresponding to the user A, carrying out encryption operation on the data set according to the public key address to obtain an encrypted data set, and carrying out encryption operation on the data set according to the public key address to obtain an encrypted data set, wherein the steps of: acquiring a user signature and a confusion public key of the user A; packaging the user signature, the confusion public key, the public key address and the data set to obtain the encrypted data set;
calculating a transfer public key address to be transferred to the user B using the encrypted data set, verifying whether the public key address and the transfer public key address are the same;
if the public key address is different from the transmission public key address, refusing to transmit the data set to the user B, and if the public key address is the same as the transmission public key address, allowing to transmit the data set to the user B, and storing the data set to a pre-constructed second block chain in a block chain manner;
the calculation method for transmitting the public key address comprises the following steps:
Figure FDA0003681570130000011
wherein the address _ transmit is a transmission public key address,
Figure FDA0003681570130000012
a first public key corresponding to the first public and private key pair and a second public key corresponding to the second public and private key pair respectively,
Figure FDA0003681570130000013
for the obfuscated public key of user a on the blockchain, KDF is an arbitrary address computation algorithm,
Figure FDA0003681570130000014
the method represents the Diffy-Hellman key exchange rule, g is a large number meeting the requirement of cryptography security, and the length of g is 2048 bits.
2. The identity-based encryption data transfer method of claim 1, wherein the assigning a first public-private key pair and a second public-private key pair to user B according to the connection request comprises:
when the user B responds to the connection request, a first private key and a second private key are randomly generated;
solving a first public key of the first private key and a second public key of the second private key according to a modular operation;
and combining the first private key and the first public key to obtain the first public and private key pair, and combining the second private key and the second public key to obtain the second public and private key pair.
3. The method for data transfer based on identity encryption of claim 2, wherein solving for the first public key of the first private key and the second public key of the second private key according to a modulo operation comprises:
solving the first public key by using the following solving formula
Figure FDA0003681570130000021
And a second public key
Figure FDA0003681570130000022
Figure FDA0003681570130000023
Figure FDA0003681570130000024
Wherein the content of the first and second substances,
Figure FDA0003681570130000025
in order to be able to use the first private key,
Figure FDA0003681570130000026
and the second private key, n, is the product value of two random prime numbers, g is a preset data value, and mod is the modular operation.
4. A method of identity encryption based data transfer as claimed in claim 3, wherein the address calculation method is:
Figure FDA0003681570130000027
Figure FDA0003681570130000028
wherein address represents a public key address of the second public and private key pair, KDF represents the address calculation method,
Figure FDA0003681570130000029
representing the diffie-hellman key exchange rule,
Figure FDA00036815701300000210
is a third public key corresponding to the third private key pair.
5. An identity encryption based data transfer method as claimed in claim 1, wherein said calculating a transfer public key address to be transferred to said user B using said encrypted data set comprises:
extracting the obfuscated public key of the user A in the encrypted data set;
and calculating to obtain the address _ transmit of the transmission public key according to the obfuscation public key.
6. An apparatus for data transmission based on identity encryption, the apparatus comprising:
a public and private key pair generation module, configured to receive a connection request from a user a to a user B, allocate a first public and private key pair and a second public and private key pair to the user B according to the connection request, and randomly allocate a third private key pair to the user a when the allocation of the first public and private key pair and the second public and private key pair is successful;
a public key address calculation module, configured to calculate, according to the first public-private key pair, the second public-private key pair, and the third private key pair, a public key address of the second public-private key pair based on an address calculation method;
the encrypted data calculation module is configured to extract a data set transmitted from a user a to a user B from a pre-constructed first blockchain corresponding to the user a, perform an encryption operation on the data set according to the public key address to obtain an encrypted data set, and includes: acquiring a user signature and a confusion public key of the user A; packaging the user signature, the confusion public key, the public key address and the data set to obtain the encrypted data set;
a data transmission module, configured to calculate a public key transmission address to be transmitted to the user B using the encrypted data set, verify whether the public key address is the same as the public key transmission address, refuse to transmit the data set to the user B if the public key address is not the same as the public key transmission address, allow to transmit the data set to the user B if the public key address is the same as the public key transmission address, and store the data set in a block chain manner in a second block chain that is pre-constructed;
the calculation method for transmitting the public key address comprises the following steps:
Figure FDA0003681570130000031
wherein the address _ transmit is a transmission public key address,
Figure FDA0003681570130000032
respectively corresponding to a first public and private key pairA second public key corresponding to the first public and private key pair,
Figure FDA0003681570130000033
for the obfuscated public key of user a on the blockchain, KDF is an arbitrary address computation algorithm,
Figure FDA0003681570130000034
the method represents the Diffy-Hellman key exchange rule, g is a large number meeting the requirement of cryptography security, and the length of g is 2048 bits.
7. An identity encryption-based data transfer apparatus as claimed in claim 6, wherein said assigning a first public-private key pair, a second public-private key pair to said user B in accordance with said connection request comprises:
when the user B responds to the connection request, a first private key and a second private key are randomly generated;
solving a first public key of the first private key and a second public key of the second private key according to a modular operation;
and combining the first private key and the first public key to obtain the first public and private key pair, and combining the second private key and the second public key to obtain the second public and private key pair.
8. An electronic device, characterized in that the electronic device comprises:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the identity-based encryption data transfer method of any of claims 1 to 5.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method of data transfer based on identity encryption according to any one of claims 1 to 5.
CN202010471292.2A 2020-05-28 2020-05-28 Data transmission method and device based on identity encryption and storage medium Active CN111683070B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010471292.2A CN111683070B (en) 2020-05-28 2020-05-28 Data transmission method and device based on identity encryption and storage medium
PCT/CN2021/096243 WO2021239034A1 (en) 2020-05-28 2021-05-27 Identity encryption-based data transmission method and apparatus, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010471292.2A CN111683070B (en) 2020-05-28 2020-05-28 Data transmission method and device based on identity encryption and storage medium

Publications (2)

Publication Number Publication Date
CN111683070A CN111683070A (en) 2020-09-18
CN111683070B true CN111683070B (en) 2022-07-15

Family

ID=72453038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010471292.2A Active CN111683070B (en) 2020-05-28 2020-05-28 Data transmission method and device based on identity encryption and storage medium

Country Status (2)

Country Link
CN (1) CN111683070B (en)
WO (1) WO2021239034A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683070B (en) * 2020-05-28 2022-07-15 平安科技(深圳)有限公司 Data transmission method and device based on identity encryption and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016081134A (en) * 2014-10-10 2016-05-16 山下 健一 Advertisement browsing promotion system, information processing method and program
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3396612A1 (en) * 2017-04-24 2018-10-31 BlockSettle AB Method and system for creating a user identity
CN109919619A (en) * 2019-04-30 2019-06-21 中央财经大学 Privacy of identities guard method in a kind of transaction of block chain
CN110224985B (en) * 2019-05-07 2022-07-08 平安科技(深圳)有限公司 Data processing method and related device
CN110675265B (en) * 2019-09-29 2022-07-08 四川师范大学 Method for realizing block chain double-key hiding address protocol without temporary key leakage
CN110519059B (en) * 2019-09-29 2023-05-05 四川师范大学 Bilinear mapping-based block chain double-key hidden address processing method
CN111683070B (en) * 2020-05-28 2022-07-15 平安科技(深圳)有限公司 Data transmission method and device based on identity encryption and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016081134A (en) * 2014-10-10 2016-05-16 山下 健一 Advertisement browsing promotion system, information processing method and program
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium

Also Published As

Publication number Publication date
WO2021239034A1 (en) 2021-12-02
CN111683070A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN112732297B (en) Method and device for updating federal learning model, electronic equipment and storage medium
CN113422686B (en) Gateway layer authentication method, system, electronic device and storage medium
CN110968644A (en) Data processing method and equipment
CN114884697A (en) Data encryption and decryption method based on state cryptographic algorithm and related equipment
CN113055380A (en) Message processing method and device, electronic equipment and medium
CN114389889B (en) File full life cycle management method and device based on block chain technology
CN111695097A (en) Login checking method and device and computer readable storage medium
CN112286872A (en) Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium
CN114760114B (en) Identity authentication method, device, equipment and medium
CN111683070B (en) Data transmission method and device based on identity encryption and storage medium
CN112699390B (en) Data processing method, device, electronic equipment, storage medium and program product
CN113221154A (en) Service password obtaining method and device, electronic equipment and storage medium
CN112217639A (en) Data encryption sharing method and device, electronic equipment and computer storage medium
CN114697132B (en) Method, device, equipment and storage medium for intercepting repeated access request attack
CN114826725B (en) Data interaction method, device, equipment and storage medium
CN114331460A (en) Method, device, equipment and storage medium for confirming fund transaction based on block chain
CN112988888B (en) Key management method, device, electronic equipment and storage medium
KR102457915B1 (en) Electronic vote system using smart contract of blockchain and method thereof
CN114125158A (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN110969529A (en) Communication method, device and system for digital asset transaction
CN113055178A (en) Block chain system, and method, system, device and medium for transmitting numerical information
CN114826613B (en) Identity information query method, device, equipment and storage medium based on blockchain
CN116340984B (en) User information management method and system based on intelligent community
CN115473739A (en) Data processing method, device and equipment based on block chain and storage medium
CN117176481B (en) Process safety authentication method and device for logic electronic seal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant